Bug 101572
Summary: | kernel ptrace bug | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 2.1 | Reporter: | Milan Brabec <milan.brabec> |
Component: | kernel | Assignee: | Larry Woodman <lwoodman> |
Status: | CLOSED NOTABUG | QA Contact: | Brian Brock <bbrock> |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | 2.1 | CC: | petr.sava, riel |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | i686 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2003-08-04 15:23:24 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Milan Brabec
2003-08-04 08:13:10 UTC
be careful; if you tested this exploit before you updated the kernel as well, it will have made itself setuid root..... so it appears to have succeeded. Is this the case ? Yes, we have had the binary setuid root. Sorry. |